Data Hiding Techniques and Key Modulations in Encrypted Images

DUVVI NALINI TEJA, M. SAMPATH KUMAR

Abstract


The transmission of confidential data over the network requires more security. So, for improving security in data transmission, we can hide the data inside an encrypted image. Hence the confidentiality of the image and the data embedded in the image is maintained. The data embedded can be extracted without any error, and also the cover image can be restored with error free. This type of techniques is termed as Reversible Data Hiding. We are conducting a survey in this paper based on different Reversible data hiding techniques. In this technique the original image can be recovered losslessly. If we use a combined lossless and reversible data hiding techniques, one part of data can be extracted before image encryption and another confidential part can be extracted after encryption.


Full Text:

PDF




Copyright (c) 2017 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org